Practical Advice for Small and Medium Environment DDoS Survival



Similar documents
Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

DDoS Mitigation Techniques

TDC s perspective on DDoS threats

DDoS Overview and Incident Response Guide. July 2014

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Approaches for DDoS an ISP Perspective.

Automated Mitigation of the Largest and Smartest DDoS Attacks

F5 Silverline DDoS Protection Onboarding: Technical Note

How To Block A Ddos Attack On A Network With A Firewall

Reducing the impact of DoS attacks with MikroTik RouterOS

ΕΠΛ 674: Εργαστήριο 5 Firewalls

How Cisco IT Protects Against Distributed Denial of Service Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Cloud Security In Your Contingency Plans

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Mitigating DDoS Attacks at Layer 7

A Layperson s Guide To DoS Attacks

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

INTRODUCTION TO FIREWALL SECURITY

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

IDG Connect DDoS Survey

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Arbor s Solution for ISP

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Introduction of Intrusion Detection Systems

Firewalls P+S Linux Router & Firewall 2013

CS 356 Lecture 16 Denial of Service. Spring 2013

VALIDATING DDoS THREAT PROTECTION

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Networking for Caribbean Development

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A S B

Firewalls. Chapter 3

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Introducing FortiDDoS. Mar, 2013

How To Understand A Network Attack

How to Evaluate DDoS Mitigation Providers:

Firewalls. Pehr Söderman KTH-CSC

First Line of Defense

Stop DDoS Attacks in Minutes

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

How to launch and defend against a DDoS

Ferramentas de Ataques de DDoS e a Evolução de ameaças a disponibilidade contra serviços Internet. Julio Arruda Gerente America Latina Engenharia

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

First Line of Defense

Stop DDoS Attacks in Minutes

CSE543 - Computer and Network Security Module: Firewalls

Chapter 15. Firewalls, IDS and IPS

The Top 10 DDoS Attack Trends

Firewalls. Network Security. Firewalls Defined. Firewalls

Pravail 2.0 Technical Overview. Exclusive Networks

Guideline on Firewall

DDoS Protection Technology White Paper

Chapter 8 Network Security

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

The Expanding Role of Service Providers in DDoS Mitigation

co Characterizing and Tracing Packet Floods Using Cisco R

CSC574 - Computer and Network Security Module: Firewalls

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

DDoS Protection on the Security Gateway

DDoS attacks in CESNET2

Firewall Firewall August, 2003

Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing _06_2000_c1_sec3

Chapter 8 Security Pt 2

Business Case for a DDoS Consolidated Solution

Firewall Defaults and Some Basic Rules

FortiDDos Size isn t everything

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

Huawei Traffic Cleaning Solution

What to Look for When Choosing a CDN for DDoS Protection Written by Bizety

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

Debugging With Netalyzr

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

CS Computer and Network Security: Firewalls

DDoS Mitigation Strategies

Transcription:

Practical Advice for Small and Medium Environment DDoS Survival Chris "Mac" McEniry Sony Network Entertainment @macmceniry November 8 13, 2015 Washington, D.C. www.usenix.org/lisa15 #lisa15 1

Practical Advice for Small and Medium Environment DDoS Survival Chris "Mac" McEniry Sony Network Entertainment @macmceniry Branson Matheson Cisco @sandinak November 8 13, 2015 Washington, D.C. www.usenix.org/lisa15 #lisa15 2

Who are we? Chris McEniry Network Engineer Sony 15+ Year IT Pro Mgr Defcon network Trainer and Speaker Branson Matheson Tech Lead - Cisco 15+ year IT Pro Mgr ShmooCon Network Trainer and Speaker Geeks who like to do fun stuff with cool networks

Who is this for? Online Services 1-3 points of presence 1Gbps-20Gbps per POP 4

Topics Defining a DDoS Knowing Attack Categories Defense Strategy 5

What's a Distributed Denial of Service? Attack intended to disrupt access to your service with the following properties: Internet based (multiple sources) Sufficient volume targetting a critical resource Most obvious: Pipes Others: Connection, state tables, CPU, etc 6

DDoS getting larger 7

Renting is easy 8

"Know Thyself" 9

Know Thyself What does your traffic look like Are you using all the protocols and ports that are likely to be open? Using UDP? Only using TCP ports? Only using HTTPS? Does everyone need to be able to access you? (E.g. do you really need traffic from China?) 10

Know Thyself What does recovery look like Does it look different than an attack? What does it mean to your business model? 11

Know Thyself How much downtime can you take How much does it cost? What parts of your site or infrastructure can be down? In what order are you willing to sacrifice functionality to keep some availability? 12

Know Thyself Your responses to the above will dictate your DDoS Mitigation Strategy. 13

Know Thy Adversary? 14

Know Thy Adversary? Knowing the attacker thinking can be irrelevant* Knowing the attacker methodologies is useful * Ok, not completely, but less than you think. 15

Know Thy Adversary? There's probably multiple attackers Multiple motivations Majority are making a name or statement Some are smarter than you * Ok, not completely, but less than you think. 16

Know Thy Adversary? Can you really game theorize all possible reasoning and vectors? * Ok, not completely, but less than you think. 17

Know Thy Adversary? The mitigations are largely the same And largely determined by "Know Thyself" The hows - not the whys 18

Know Thy Adversary? Places to look for attack types and volumes Verisign DDoS Trends Report Neustar DDoS Attacks and Protection Report Arbor Atlas - DDoS Digital Attack Map ISC Storm Center And many other reports 19

Attack Categories 20

Attack Categories Three Dimensions What Network Layer (Vertical)? What Network Point (Horizontal)? Type of Source? 21

Attack Categories: Vertical What layer of the network stack? "Network": Layer3/4 - IP/UDP/ TCP/etc "Application": HTTP 22

Attack Categories: Horizontal How deep are they attacking you? Your border? Your application servers? Your ISP's infrastructure? 23

Attack Categories : Source Direct or indirect? Am I (or my botnet) sending the attack? Am I coercing others into sending the attack? 24

Common Attacks Network Attacks Target Infrastructure - Pipe Capacity, State Tables, Network Device CPU, etc. IP Fragmentation, SYN Flood, Christmas Tree Floods 25

Common Attacks "Application" (and here it's HTTP centric) Target the application servers and consume their CPU, connections, threads, etc HTTP Post, Slow Read 26

Common Attacks Reflection and Amplification Attacks Requires a small amount of input to send a large amount of traffic to target Uses single/multiple third parties to send the actual traffic https://www.internetsociety.org/sites/default/files/01_5.pdf 27

Common Attacks Application Amplification Attacks are starting to happen Being able to change a small amount of HTTP (e.g. javascript) traffic to trigger many requests to the target Great Cannon 28

Common Attacks Intermediaries ISPs Dependent SaaSes (e.g. Image Converters, Code Hosting) Dependent JS libraries 29

Lifecycle Small attackers / Scanners - Firewall is able to Block Attackers get bigger - Move to stateless ACLs to solve Network attacks Attackers use reflections - Move to vendor who can sustain bandwidth Attackers turn to application - IPS/WAF Attackers get/sacrifice a large bonnet - Vendor Application Proxies 30

Defense Strategy 31

How to defend? Its all about reducing the bad traffic which you receive Fundamentally, 2 questions: What effort at each level are you going to use? Are you going to do it yourself? or have someone else do it? 32

Self Defense: Network Level Any packet filtering device defends at the Network level However, that packet filtering device can become a bottleneck itself ACLs, Firewalls, iptables, "not listening" The further upstream you can push these, the better Some ISPs may apply ACLs for you BGP null route advertisements 33

Self Defense: Network/Application Level Intrusion Prevention Systems (IPS) Since can do deep packet inspection, can be considered application level Matches patterns (e.g. regex) and denies But can also do network level protections (SYN Proxy) Likely to be able to handle more bad traffic than similarly classed firewalls Likely to be able to incorporate reputation filters 34

Self Defense: Application Level Web Application Firewalls See above - IPS Inspect flows in an application context and react Deny bad patterns Rate limit flows Incorporate reputation filters 35

Self Defense: Pros You will have a better understanding of your own traffic Always active Lower coordination on mitigation 36

Tipping the scale (Self Defense: Cons) Pipes can only handle so much At some point, can't even handle the incoming traffic on your pipes, regardless of internal protections Consider a vendor solution (beyond ISP cooperation) 37

Stateful vs Stateless Rough comparison: Switch/Router ACLs vs Firewalls Rules of thumb: Use stateless to control destination and IP reputation "Of the 64K tcp ports, only allow in to port 443/tcp" "Don't let in Country X" Use stateful to control source (outside IP reputation) "Only allow my offices to hit my port 443/tcp" 38

Vendor Solutions Two main methods: Network Scrubbers Application Proxies 39

Network Scrubbers Route all incoming traffic, at the IP level, through scrubber They become your BGP announcer Traffic is then sent to you: either direct connection or encapsulated and retransmitted over the Internet Can be always-on or on-demand Even under always-on, have a static stance (e.g. ACLs) and an under-attack stance (actual mitigation gear) 40

Application Proxies Direct traffic to their endpoints by updating DNS Become the endpoint of connection for client connections Inspect, and then proxy those connections back to you 41

Application Proxies Typically, always on Application specific: "Works if they speak your protocol" - Typically DNS, HTTP/HTTPS, even SMTP/IMAP But by nature will front Layer3/4 attacks 42

Vendor Pros 1Tbps+ Internet capacity and scrubbing capacity 24x7 staff focused on DDoS Up to date mitigation software/hardware 43

Vendor Cons Over-subscription: Other customer's attacks can affect you Vendors becomes your ISP to a degree Any of their carrier issues become your issues Added bonus: No longer a direct carrier relationship. More coordination 44

Vendor Gotchas What is mitigation going to do to your normal traffic? Most stances are based around browser based web traffic. Native phone apps, embedded devices (IoT) may not like that 45

Vendor Gotchas Cannot stress how important that connection back to you is How hidden is your origin? Application to either Network Scrubbers or Application Proxies Do your origin endpoints show up in WHOIS? Reverse DNS? Can one scan your actual network and start to determine where those endpoints really are? 46

Items to look for in a Vendor Internet Capacity vs Scrubbing Capacity Points of Presence: Internet facing, and clean traffic to you facing Scrubbing Mechanisms Configuration, Incident, Maintenance Transparency Connection options: GRE or Meet-Me Cross Connects? Pricing Model: Always on? Incoming or just clean traffic? Port fees? 47

Potential Vendors A10 Networks Akamai Amazon AWS Arbor Networks CloudFlare Corero F5 / Silverline Google Compute Engine Imperva / Incapsula Level3 Limelight Neustar Verisign No endorsements and not exhaustive. Strictly a starting point. 48

Which path? Depends on where you are in attacker/defender cat mouse game or your budget (time and money)? Depends on your applications (e.g. are they already on a vendor CDN?) Depends on your whole system (e.g. think about all of your dependencies not just for the running application, but also for your business mechanisms like updating the application) 49

Parting Shot Amplification attacks are the biggest threats right now Don't contribute to the problem Are you running an open NTP server? Do you have any large public DNS records available via UDP? Are you watching your egress traffic? Is it all from you? 50

Chris "Mac" McEniry Sony Network Entertainment @macmceniry Branson Matheson Cisco @sandinak 51